Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2379636.2379686acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinteraccionConference Proceedingsconference-collections
research-article

Integrating multi-source user data to enhance privacy in social interaction

Published: 03 October 2012 Publication History

Abstract

New trends in pervasive computing allow for hosting user controlled servers for integrating respective user's social spheres. One main feature of such servers is the provision of a single point for managing user's data and resources from various social interaction services (e.g., LinkedIn, Facebook, etc.). A step forward would be to include the collection and integration of different social contacts and their live streams (e.g., activity status, live posts, etc.) from these services. Thereby, various privacy issues related to linkability and unwanted information disclosure, could arise. In this paper, we address how we intend to avoid such privacy issues in the EU FP7 funded di.me project when mining users' social spheres from different sources. Our approach uses (1) the detection of semantic equivalence between contacts as portrayed in online profiles and (2) NLP techniques for analysing shared live streams both; for triggering privacy recommendations. The current status is presented and the portability to other environments is shortly discussed.

References

[1]
M. Bourimi, M. Heupel, B. Westermann, D. Kesdogan, M. Planaguma, R. Gimenez, F. Karatas, and P. Schwarte. Towards transparent anonymity for user-controlled servers supporting collaborative scenarios. In Information Technology: New Generations (ITNG), 2012 Ninth International Conference on, pages 102--108, april 2012.
[2]
M. Bourimi, F. Kühnel, J. M. Haake, D. El Diehn I. Abou-Tair, and D. Kesdogan. Tailoring collaboration according privacy needs in real-identity collaborative systems. In Proceedings of the 15th international conference on Groupware: design, implementation, and use, CRIWG'09, pages 110--125, Berlin, Heidelberg, 2009. Springer-Verlag.
[3]
M. Bourimi, J. Ossowski, D.-D. Abou-Tair, S. Berlik, and D. Abu-Saymeh. Towards usable client-centric privacy advisory for mobile collaborative applications based on BDDs. In New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference on, pages 1--6, feb. 2011.
[4]
M. Bourimi, S. Scerri, M. Planaguma, M. Heupel, F. Karatas, and P. Schwarte. A two-level approach to ontology-based access control in pervasive personal servers. http://nbn-resolving.de/urn:nbn:de:hbz:467--5789, 2011. Scientific research paper (ger. Wissenschaftlicher Artikel) in the context of the EU FP7 project di.me, 2011, OPUS Siegen.
[5]
K. Cortis, S. Scerri, I. Rivera, and S. Handschuh. Discovering semantic equivalence of people behind online profiles. In Proceedings of the Resource Discovery (RED) Workshop, ESWC 2012, 2012.
[6]
Diaspora Foundation. The DIASPORA PROJECT. http://diasporaproject.org/, March 2012.
[7]
Eclipse.org. Higgins 2.0 Personal Data Service. http://wiki.eclipse.org/Higgins 2.0, March 2012.
[8]
S. Gindin. Nobody Reads Your Privacy Policy or Online Contract? Lessons Learned and Questions Raised by the FTC's Action Against Sears. Nw J Tech & Intell Prop, 2009.
[9]
M. Heupel, L. Fischer, D. Kesdogan, M. Bourimi, S. Scerri, F. Hermann, and R. Gimenez. Context-aware, trust-based access control for the di.me userware. In New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, pages 1--6, may 2012.
[10]
J. I. Hong and J. A. Landay. An architecture for privacy-sensitive ubiquitous computing. In MobiSys '04: Proceedings of the 2nd international conference on Mobile systems, applications, and services, pages 177--189, New York, NY, USA, 2004. ACM.
[11]
F. Karatas, M. Bourimi, T. Barth, D. Kesdogan, R. Gimenez, W. Schwittek, and M. Planaguma. Towards secure and at-runtime tailorable customer-driven public cloud deployment. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pages 124--130, march 2012.
[12]
I. King, M. R. Lyu, and H. Ma. Introduction to social recommendation. In Proceedings of the 19th international conference on World wide web, WWW '10, pages 1355--1356, New York, NY, USA, 2010. ACM.
[13]
I. Krontiris and F. Freiling. Integrating people-centric sensing with social networks: A privacy research agenda. In Pervasive Computing and Communications Workshops (PERCOM Workshops), 2010 8th IEEE International Conference on, pages 620--623, 29 2010-april 2 2010.
[14]
A. Monge and C. Elkan. The field matching problem: Algorithms and applications. In Proc. Second International Conference on Knowledge Discovery and Data Mining, pages 267--270, 1996.
[15]
A. Narayanan and V. Shmatikov. De-anonymizing social networks. 30th IEEE Symposium on Security and Privacy, 2009.
[16]
L. Palen and P. Dourish. Unpacking "privacy" for a networked world. In CHI '03: Proceedings of the SIGCHI conference on Human factors in computing systems, pages 129--136, New York, NY, USA, 2003. ACM Press.
[17]
A. Papangelis, G. Galatas, and F. Makedon. A recommender system for assistive environments. In Proceedings of the 4th International Conference on PErvasive Technologies Related to Assistive Environments, PETRA '11, pages 6:1--6:4, New York, NY, USA, 2011. ACM.
[18]
S. R. Ray. Interoperability standards in the semantic web. Journal of Computing and Information Science in Engineering, ASME, 2:65--69, 2002.
[19]
O. Sacco and A. Passant. A privacy preference ontology (PPO) for linked data. In Linked Data on the Web Workshop at 20th International World Wide Web Conference. ACM Press, 2011.
[20]
S. Scerri, K. Cortis, I. Rivera, and S. Handschuh. Knowledge discovery in distributed social web sharing activities. In Proceedings of the 2nd Workshop on Making Sense of Microposts (MSM2012), WWW 2012, 2012.
[21]
S. Scerri, R. Gimenez, F. Herman, M. Bourimi, and S. Thiel. digital.me - towards an integrated personal information sphere. http://d-cent.org/fsw2011/agenda/papers/, June 2011. World Wide Web Consortium -W3C-: Federal Social Web 2011. Online resource: Workshop on Social Network Interoperability & Privacy; Europe.
[22]
E. Shen, H. Lieberman, and F. Lam. What am i gonna wear?: scenario-oriented recommendation. In Proceedings of the 12th international conference on Intelligent user interfaces, IUI '07, pages 365--368, New York, NY, USA, 2007. ACM.
[23]
D. A. Smith, M. V. Kleek, O. Seneviratne, M. schraefel, A. Bertails, T. Berners-Lee, W. Hall, and N. Shadbolt. Webbox: Supporting decentralised and privacy-respecting micro-sharing with existing web standards. http://people.csail.mit.edu/emax/papers/www2012-webbox.pdf, 2012. ACM Press. (to appear in the WWW 2012 procedings).
[24]
S. Thiel, M. Bourimi, R. Gimenez, S. Scerri, A. Schuller, M. Valla, S. Wrobel, C. Fra, and F. Hermann. A requirements-driven approach towards decentralized social networks. In Future Information Technology, Application, and Service, volume 164 of Lecture Notes in Electrical Engineering, pages 709--718. Springer-Verlag, 2012.
[25]
C. Wartena, W. Slakhorst, and M. Wibbels. Selecting keywords for content based recommendation. In Proceedings of the 19th ACM international conference on Information and knowledge management, CIKM '10, pages 1533--1536, New York, NY, USA, 2010. ACM.

Cited By

View all
  • (2019)Privacy-driven access control in social networks by means of automatic semantic annotationComputer Communications10.1016/j.comcom.2016.01.00176:C(12-25)Online publication date: 5-Jan-2019
  • (2013)Trust and Privacy in the di.me UserwareProceedings, Part III, of the 15th International Conference on Human-Computer Interaction. Users and Contexts of Use - Volume 800610.5555/2959924.2959930(39-48)Online publication date: 21-Jul-2013
  • (2013)Privacy-preserving concepts for supporting recommendations in decentralized OSNsProceedings of the 4th International Workshop on Modeling Social Media10.1145/2463656.2463659(1-4)Online publication date: 1-May-2013
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
INTERACCION '12: Proceedings of the 13th International Conference on Interacción Persona-Ordenador
October 2012
193 pages
ISBN:9781450313148
DOI:10.1145/2379636
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • KAU: King Abdulaziz University, Saudi Arabia
  • UCLM: University of Castilla-La Mancha

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 October 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. decentralized solutions
  2. di.me
  3. personal information management
  4. pervasive computing
  5. privacy recommendations
  6. social networking

Qualifiers

  • Research-article

Funding Sources

Conference

INTERACCION '12
Sponsor:
  • KAU
  • UCLM

Acceptance Rates

Overall Acceptance Rate 109 of 163 submissions, 67%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Privacy-driven access control in social networks by means of automatic semantic annotationComputer Communications10.1016/j.comcom.2016.01.00176:C(12-25)Online publication date: 5-Jan-2019
  • (2013)Trust and Privacy in the di.me UserwareProceedings, Part III, of the 15th International Conference on Human-Computer Interaction. Users and Contexts of Use - Volume 800610.5555/2959924.2959930(39-48)Online publication date: 21-Jul-2013
  • (2013)Privacy-preserving concepts for supporting recommendations in decentralized OSNsProceedings of the 4th International Workshop on Modeling Social Media10.1145/2463656.2463659(1-4)Online publication date: 1-May-2013
  • (2013)Multilaterally Secure Communication Anonymity in Decentralized Social NetworkingProceedings of the 2013 10th International Conference on Information Technology: New Generations10.1109/ITNG.2013.84(498-504)Online publication date: 15-Apr-2013
  • (2013)Considering Interdependent Protection Goals in Domain-Specific ContextsProceedings of the 2013 10th International Conference on Information Technology: New Generations10.1109/ITNG.2013.12(27-32)Online publication date: 15-Apr-2013
  • (2013)Towards visual configuration support for interdependent security goalsProceedings of the 5th international conference on Online Communities and Social Computing10.1007/978-3-642-39371-6_42(375-384)Online publication date: 21-Jul-2013
  • (2013)Trust and Privacy in the di.me UserwareHuman-Computer Interaction. Users and Contexts of Use10.1007/978-3-642-39265-8_5(39-48)Online publication date: 2013
  • (2013)An Ontology-Based Technique for Online Profile ResolutionProceedings of the 5th International Conference on Social Informatics - Volume 823810.1007/978-3-319-03260-3_25(284-298)Online publication date: 25-Nov-2013
  • (2012)Techniques for the Identification of Semantically-Equivalent Online IdentitiesRevised Selected Papers of the 5th International Workshop on Resource Discovery - Volume 819410.1007/978-3-642-45263-5_1(1-22)Online publication date: 27-May-2012

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media